Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhixin Sun is active.

Publication


Featured researches published by Zhixin Sun.


IEEE Access | 2017

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

Guofeng Lin; Hanshu Hong; Zhixin Sun

Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback in urgent need of solution is the key escrow problem. We indicate that front-end devices of clients like smart phones generally have limited privacy protection, so if private keys are entirely held by them, clients risk key exposure that is hardly noticed but inherently existed in previous research. Furthermore, enormous client decryption overhead limits the practical use of ABE. In this paper, we propose a collaborative key management protocol in CP-ABE. Our construction realizes distributed generation, issue and storage of private keys without adding any extra infrastructure. A fine-grained and immediate attribute revocation is provided for key update. The proposed collaborative mechanism effectively solves not only key escrow problem but also key exposure. Meanwhile, it helps markedly reduce client decryption overhead. A comparison with other representative CP-ABE schemes demonstrates that our scheme has somewhat better performance in terms of cloud-based outsourced data sharing on mobile devices. Finally, we provide proof of security for the proposed protocol.


Symmetry | 2017

Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search

Hanshu Hong; Yunhao Xia; Zhixin Sun

Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for providing fine-grained data access control in the cloud. Researchers have also taken their advantages to present searchable encryption schemes based on ABE and have achieved significant results. However, most of the existing key word search schemes based on ABE lack the properties of key exposure protection and highly efficient key updating when key leakage happens. To better tackle these problems, we present a key insulated attribute-based data retrieval scheme with key word search (KI-ABDR-KS) for multi-tenant architecture. In our scheme, a data owner can make a self-centric access policy of the encrypted data. Only when the possessing attributes match with the policy can a receiver generate a valid trapdoor and search the ciphertext. The proposed KI-ABDR-KS also provides full security protection when key exposure happens, which can minimize the damage brought by key exposure. Furthermore, the system public parameters remain unchanged during the process of key updating; this will reduce the considerable overheads brought by parameters synchronization. Finally, our KI-ABDR-KS is proven to be secure under chosen-keyword attack and achieves better efficiency compared to existing works.


Journal of Physics: Conference Series | 2017

Secure and Efficient Signature Scheme Based on NTRU for Mobile Payment

Yunhao Xia; Lirong You; Zhe Sun; Zhixin Sun

Mobile payment becomes more and more popular, however the traditional public-key encryption algorithm has higher requirements for hardware which is not suitable for mobile terminals of limited computing resources. In addition, these public-key encryption algorithms do not have the ability of anti-quantum computing. This paper researches public-key encryption algorithm NTRU for quantum computation through analyzing the influence of parameter q and k on the probability of generating reasonable signature value. Two methods are proposed to improve the probability of generating reasonable signature value. Firstly, increase the value of parameter q. Secondly, add the authentication condition that meet the reasonable signature requirements during the signature phase. Experimental results show that the proposed signature scheme can realize the zero leakage of the private key information of the signature value, and increase the probability of generating the reasonable signature value. It also improve rate of the signature, and avoid the invalid signature propagation in the network, but the scheme for parameter selection has certain restrictions.


DEStech Transactions on Computer Science and Engineering | 2017

Provably Secure Key Insulated Attribute Based Signature without Bilinear Pairings for Wireless Communications

Hanshu Hong; Yunhao Xia; Zhixin Sun


Journal of Intelligent and Fuzzy Systems | 2018

Adaptive type-2 fuzzy traffic signal control with on-line optimization

Yunrui Bi; Zhe Sun; Xiaobo Lu; Zhixin Sun; Di Liu; Kun Liu


IEEE Transactions on Intelligent Transportation Systems | 2018

Optimal Type-2 Fuzzy System For Arterial Traffic Signal Control

Yunrui Bi; Xiaobo Lu; Zhe Sun; Dipti Srinivasan; Zhixin Sun


IEEE Access | 2018

Performance Modeling and Suitability Assessment of Data Center Based on Fog Computing in Smart Systems

Pan Wang; Xuejiao Chen; Zhixin Sun


IEEE Access | 2018

A Weighted Frequent Itemset Mining Algorithm for Intelligent Decision in Smart Systems

Xuejian Zhao; Xinhui Zhang; Pan Wang; Songle Chen; Zhixin Sun


IEEE Access | 2018

Cognitive Radio-Based Smart Grids: From the Perspective of Full-Duplex Primary Users

Dongming Li; Zhixin Sun; Xuejian Zhao


IEEE Access | 2018

Type-2 Fuzzy Sliding Mode Anti-Swing Controller Design and Optimization for Overhead Crane

Zhe Sun; Yunrui Bi; Xuejian Zhao; Zhixin Sun; Chun Ying; Shuhua Tan

Collaboration


Dive into the Zhixin Sun's collaboration.

Top Co-Authors

Avatar

Xuejian Zhao

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Zhe Sun

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Hanshu Hong

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yunhao Xia

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Guofeng Lin

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Pan Wang

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yunrui Bi

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xinhui Zhang

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Di Liu

Nanjing Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge